this post was submitted on 12 May 2023
11 points (82.4% liked)

Privacy

31482 readers
1069 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] comfy@lemmy.ml 1 points 1 year ago (1 children)

There is no such thing as "full security and privacy". It doesn't exist and it's not a useful goal.

Security and privacy don't exist as absolute values. Things are not universally more or less secure than other things. You need to understand things like the needs of a situation (e.g. you correctly pointing out a modern phone has more use-cases than a landline), who the threats are, and what their capabilities are. Putting a decent password on an iPhone makes it adequately private and secure against my parents. Using a landline is not adequately secure against a government agency. Know Your Enemy!

As for your advice, a quick counter:

  • FOSS does not imply correctness. In fact, FOSS is great because we know for a fact it has and always will have bugs! That helps us know his much to trust it instead of being a mystery like proprietary junk. So while I personally trust GrapheneOS to do those tasks better than stock ROMs, that line of reasoning is dangerous and historically known to be inaccurate.
  • FOSS is on the software level anyway, certain adversaries are capable of attacking at the hardware level. Typical scammers aren't. Who's your threat??
[โ€“] mariubrlu@mastodonapp.uk 0 points 1 year ago

@comfy Indeed you need context, but let's limit the concept "full security and privacy" to aspects that are under your control. E.g you might control the physical security of your phone, but you might not control how many men-in-the-middle are between you and the rest of the internet. Like any regular technology user my threat actors are big-tech and establishments.